Chapter 21 – Malicious Code and Application Attacks Flashcards

1
Q
  1. What is the most commonly used technique to protect against virus attacks?
    Signature detection
A

Signature detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. You are the security administrator for an e-commerce company and are placing a new web server into production. What network zone should you use?
    DMZ
A

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Which one of the following types of attacks relies on the difference between the timing of two events?
    TOCTOU
A

TOCTOU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Which of the following techniques is most closely associated with APT attacks?
    Zero-day exploit
A

Zero-day exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. What advanced virus technique modifies the malicious code of a virus on each system it infects?
    Polymorphism
A

Polymorphism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Which one of the following tools provides a solution to the problem of users forgetting complex passwords?
    LastPass
A

LastPass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. What type of application vulnerability most directly allows an attacker to modify the contents of a system’s memory?
    Buffer overflow
A

Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Which one of the following passwords is least likely to be compromised during a dictionary attack?
    Fsas3alG
A

Fsas3alG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. What technique may be used to limit the effectiveness of rainbow table attacks?
    Salting
A

Salting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. What character should always be treated carefully when encountered as user input on a web form?
A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly